Vol1Unit2review.txt

The flashcards below were created by user
CapptainClutch
on FreezingBlue Flashcards.

what is a measure used to verify the eligibility of a subject and the ability of the subject to access certain info?

authentication

what are 3 primary ways to authenticate ones self?

something you know, are, have.

knowledge based identification and authentication methods require the user to provide something you?

know

the AF requires a network password to be atleast how many characters long?

9

what regulation covers remanence security?

AFSSI 8580

storage media that retains data after power is removed is considered?

Sensitive

which standard form is used to annotate storage media has been sanitized?

711

who can declassify storage media that has been sanitized?

Infomation Owner

what is the process of physically damaging the media to render is unusable in a computer and render the data on the media irretrievable by any known exploitation methods?

destroying

what is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field?

Degaussing

what is the preferred method of sanitizing magnetic media?

Degaussing

what is a comprehensive evaluation and validation of an air force info system to establish the degree to which it complies with assigned info assurance controls based on standardized procedures?

Certification

what is a formal declaration by a designated approving official (DAA) that an info system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk?

Accredidation

what is the DOD process for certifying and accrediting info systems to operate on the global info grid (GIG)?

what is the database of record for registering all systems and applications?

DITSCAP

what is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy?

Enclave

how many non-secure internet protocol router network (NIPRNET) gateways does the af possess?

16

which agency must approve all info protection tools prior to their use?

HQ USAF

what device is placed outside the boundary protection mechanism to monitor all attempted attacks?

Intrusion Detection System (IDS)

what are examples of network attacks that bypass the firewall?

Tunneling and application based attacks

what is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?

Tunneling

a base web server that inferfaces with the public must be placed in what area of a base network?

DMZ

what is the simplest and least expensive way to stop an inappropriate netowork address?

packet filtering

what type of firewall consists of a screening router and a set of rules that accept or reject a message based on information int he messages header (a packet): the source address, the destination, and the port?

Packet Filtering

what type of firewall is used to separate secure sites, networks, or network segments from less secure areas?

Bastion Host

what type of firewall generates audit trails of all network related activity for monitoring and intrusion detection purposes?